Search results
Filter
Filetype
Your search for "*" yielded 529640 hits
Prostate cancer incidence and survival in relation to prostate cancer as second cancer in relatives
OBJECTIVES: To investigate if the risk of prostate cancer (PC) differs based on the order of primary PC diagnosed in first-degree relatives (FDRs) given possibly different risk factors for PC as first primary cancer (PCa-1) and second primary cancer (PCa-2).SUBJECTS AND METHODS: In this Swedish nationwide cohort, PC diagnosis was followed for among 149,985 men with one FDR affected by PCa-1, 10,97
Putin: the psychology behind his destructive leadership – and how best to tackle it according to science
A Security Framework in Digital Twins for Cloud-based Industrial Control Systems: Intrusion Detection and Mitigation
With the help of modern technologies and advances in communication systems, the functionality of Industrial control systems (ICS) has been enhanced leading toward to have more efficient and smarter ICS. However, this makes these systems more and more connected and part of a networked system. This can provide an entry point for attackers to infiltrate the system and cause damage with potentially ca
No title
No title
No title
Palestine: Whose Cyber Security Without Cyber Sovereignty?
Israel: Cyber Warfare and Security as National Trademarks of International Legitimacy
Deterritorializing Cyber Security and Warfare in Palestine: Hackers, Sovereignty, and the National Cyberspace as Normative
Cyber security strategies operate on the normative assumption that national cyberspace mirrors a country's territorial sovereignty. Its protection commonly entails practices of bordering through infrastructural control and service delivery, as well as the policing of data circulation and user mobility. In a context characterized by profound territorial fragmentation, such as the Occupied Palestini
Toward an Aesthetics by Algorithms—Palestinian Cyber and Digital Spaces at the Threshold of (In)visibility
This chapter explores how algorithms produce aesthetic forms and dystopian configurations across Palestinian cyber and digital spaces. Through surveillance and erasure, algorithms operate as infrastructures of (in)visibility across social media and digital maps. While serving the Israeli system of control by making Palestinian users and contents hyper-visible to surveillance, algorithms ultimately
”Im sïjhth årrodh naan bahha cirkusdjur – Jag vill inte vara ett jävla cirkusdjur” : Dekolonisering av det etnografiska skådespelet i Sameblod
Annie Marion Maclean : Kvinnan i industrisamhället
För att sociologi skulle kunna vara ett eget ämne och utvecklas behövde det en empirisk ansats. Annie Marion MacLean påbörjade sina doktorandstudier på Chicago universitet 1896. Med över 200 publicerade manuskript var MacLean en pionjär i utvecklingen av Chicagoskolans etnografiska arbete och utvecklingen av både sociologisk arbetslivsforskning och urban sociologi. Hennes arbete är högst relevant
Toxicity of different sized and shaped nanoparticles in zebrafish embryos
Non-parametric Envelope Estimation for the Matched Window Reassignment
The reassigned spectrogram is a powerful tool for analysing non-stationary signals, and in an ideal setting it gives perfect time and frequency localisation. A method very well suited for oscillating transient signals is the matched window reassignment, which requires a matching window, i.e. the envelope of the transient, to be known or estimated beforehand. This paper proposes a novel method for
Parameter Estimation from the Cross-Spectrogram Reassignment Vectors
In this paper we propose a novel technique to estimate the parameters of two Gaussian envelope oscillatory signals, with the same time-locations and oscillatory frequencies but possibly different phases. The phase difference and the length of the Gaussian envelope are estimated directly from the slopes of the corresponding cross-spectrogram reassignment vectors. Including the phase difference and
The datafication of pain : : Trials and tribulations in measuring phantom limb pain
This article takes the phenomenon of phantom limb pain (PLP), and a therapeutic technology designed to treat it, as springboards to critically consider a transformation: from deeply subjective experiences into quantitative data. Drawing upon ethnographic fieldwork on neuroprosthetic development, I examine an international clinical trial coordinated in Sweden using neuromuscular activation, machine
Bilinear Parameterization for Non-Separable Singular Value Penalties
Low rank inducing penalties have been proven to successfully uncover fundamental structures considered in computer vision and machine learning; however, such methods generally lead to non-convex optimization problems. Since the resulting objective is non-convex one often resorts to using standard splitting schemes such as Alternating Direction Methods of Multipliers (ADMM), or other subgradient me
Homotopy Continuation for Sensor Networks Self-Calibration
Given a sensor network, TDOA self-calibration aims at simultaneously estimating the positions of receivers and transmitters, and transmitters time offsets. This can be formulated as a system of polynomial equations. Due to the elevated number of unknowns and the nonlinearity of the problem, obtaining an accurate solution efficiently is nontrivial. Previous work has shown that iterative algorithms
Localization Of Multiple Jammers In Wireless Sensor Networks
Wireless sensor networks are susceptible to jamming attacks that can result in communication breakdowns. Preemptive measures to prevent jamming attacks is an active research field, but to stop an ongoing attack often requires that one is able to locate jammers in order to neutralize them. Several methods exist for the case when the network is corrupted by a single jammer, although these generally